Kro’s Nest

Home of m5kro

Latest Posts

  • Cloud Computers for Hacking

    Cloud Computers for Hacking

    Cloud computing has been around for a while now. There are offerings from many big tech companies and it’s very cheap, sometimes free, to get a cloud server up and running. In this article, we’ll look at the uses of these servers in the world of cybersecurity. Hosts But before we begin let’s review some…

  • One Year On Medium

    One Year On Medium

    It’s been a year since I published my first article on Medium, let’s see how things went. Goals When writing my first article, my aim was to inform readers about various cybersecurity topics. I wanted to explain how attacks worked, how to use different tools, and share my experience using these tools. All of my…

  • DNS Poisoning

    DNS Poisoning

    DNS poisoning is the act of intercepting DNS requests and sending spoofed responses. This can be done as most DNS requests are sent in plaintext, making it easy to intercept. These attacks are actually quite common as most routers use it censor adult websites on devices. In this article, we’ll go over ways to perform…